Mobile Hacking and Security

We assess your mobile application to find vulnerabilities

Train you to fix

Secure your mobile application

Pre-training

Security Assessment With Analysis Report

No other training providers did this before and we are the first! Prior to the training, ZEBRAGUARD | Scan security engineers will conduct a mobile application security assessment and provide a security analysis report on your mobile application.

Understanding Your Mobile Application

You will get a clear understanding on the security and the hidden risks of your mobile applications.

Powered by:

Actual training

Hands-on Session

You will learn and improve your technical skills to test and secure mobile application and devices.

Solution-Driven

You will have the opportunity to focus and get professional consultation from trainer based on the challenges you face in the security analysis report on your mobile application.

Real-world Scenario Lab

You will practise and sharpen your skills by applying it in real-world scenarios set in InfoRisk 360° security lab.

Post-training

Skills Application

You will be able to understand and fix the vulnerabilities of your mobile application listed in the security analysis report.

Mastering Mobile Application Security

You will be able to master advanced techniques to secure and conduct security assessment mobile application.

Course Description:

This Mobile Hacking and Security training exposes the mobile hacking techniques and countermeasures for iOS and Android. Throughout the 4-day session, you will also get to practise how to analyze and evaluate mobile application threats as well as exploring how the attackers identify weaknesses. This intensive mobile hacking training is designed to equip you with the required knowledge and skills in securing mobile devices, mobile applications and mobile networks of their organization. You will also gain a deeper understanding on how to conduct mobile penetration testing and how to support BYOD infrastructures.

Course Outline:

Android Basics

Android Penetration Testing Lab Setup

Hello World in Android

Android Security Model

Reverse Engineering

Android Traffic Analysis

Android Application Penetration Testing

Automated Assessments on Android Applications

Android Forensic

iOS Basics

iOS Penetration Testing Lab Setup

Setting Up Xcode

iOS Security Model

iOS Traffic Analysis

iOS Application Penetration Testing

iOS Forensic

Remote Attacks on Mobile Devices

Introduction to BYOD

Enterprise Mobile Security

Learning Outcome:

Enable you to understand and communicate the mobile security risks associated with hacking and other exploits

Discover real-world mobile hacking techniques and countermeasures

Sharpen up your technical skills and learn to fix the mobile application vulnerabilities

Learn to perform a mobile penetration testing on own deployment and evaluate mobile security threats and possible exploits

Enable you to develop and design a secure mobile application

Enable you to tackle real-life scenarios and apply new skills to the job with ease